mirror of
https://git.openldap.org/openldap/openldap.git
synced 2025-02-23 14:09:39 +08:00
ITS#4863 s/access to attr/access to attrs/
This commit is contained in:
parent
a5363815fd
commit
d9e5a0dcbf
@ -1351,7 +1351,7 @@ create a group and allow people to add and remove only
|
|||||||
their own DN from the member attribute, you could accomplish
|
their own DN from the member attribute, you could accomplish
|
||||||
it with an access directive like this:
|
it with an access directive like this:
|
||||||
|
|
||||||
> olcAccess: to attr=member,entry
|
> olcAccess: to attrs=member,entry
|
||||||
> by dnattr=member selfwrite
|
> by dnattr=member selfwrite
|
||||||
|
|
||||||
The dnattr {{EX:<who>}} selector says that the access applies to
|
The dnattr {{EX:<who>}} selector says that the access applies to
|
||||||
@ -1375,7 +1375,7 @@ tags are maintained automatically by slapd and do not need to be specified
|
|||||||
when originally defining the values. For example, when you create the
|
when originally defining the values. For example, when you create the
|
||||||
settings
|
settings
|
||||||
|
|
||||||
> olcAccess: to attr=member,entry
|
> olcAccess: to attrs=member,entry
|
||||||
> by dnattr=member selfwrite
|
> by dnattr=member selfwrite
|
||||||
> olcAccess: to dn.children="dc=example,dc=com"
|
> olcAccess: to dn.children="dc=example,dc=com"
|
||||||
> by * search
|
> by * search
|
||||||
@ -1513,7 +1513,7 @@ E: 29. olcRootPW: secret
|
|||||||
E: 30. olcDbIndex: uid pres,eq
|
E: 30. olcDbIndex: uid pres,eq
|
||||||
E: 31. olcDbIndex: cn,sn,uid pres,eq,approx,sub
|
E: 31. olcDbIndex: cn,sn,uid pres,eq,approx,sub
|
||||||
E: 32. olcDbIndex: objectClass eq
|
E: 32. olcDbIndex: objectClass eq
|
||||||
E: 33. olcAccess: to attr=userPassword
|
E: 33. olcAccess: to attrs=userPassword
|
||||||
E: 34. by self write
|
E: 34. by self write
|
||||||
E: 35. by anonymous auth
|
E: 35. by anonymous auth
|
||||||
E: 36. by dn.base="cn=Admin,dc=example,dc=com" write
|
E: 36. by dn.base="cn=Admin,dc=example,dc=com" write
|
||||||
|
@ -897,7 +897,7 @@ create a group and allow people to add and remove only
|
|||||||
their own DN from the member attribute, you could accomplish
|
their own DN from the member attribute, you could accomplish
|
||||||
it with an access directive like this:
|
it with an access directive like this:
|
||||||
|
|
||||||
> access to attr=member,entry
|
> access to attrs=member,entry
|
||||||
> by dnattr=member selfwrite
|
> by dnattr=member selfwrite
|
||||||
|
|
||||||
The dnattr {{EX:<who>}} selector says that the access applies to
|
The dnattr {{EX:<who>}} selector says that the access applies to
|
||||||
@ -965,7 +965,7 @@ E: 20. index uid pres,eq
|
|||||||
E: 21. index cn,sn,uid pres,eq,approx,sub
|
E: 21. index cn,sn,uid pres,eq,approx,sub
|
||||||
E: 22. index objectClass eq
|
E: 22. index objectClass eq
|
||||||
E: 23. # database access control definitions
|
E: 23. # database access control definitions
|
||||||
E: 24. access to attr=userPassword
|
E: 24. access to attrs=userPassword
|
||||||
E: 25. by self write
|
E: 25. by self write
|
||||||
E: 26. by anonymous auth
|
E: 26. by anonymous auth
|
||||||
E: 27. by dn.base="cn=Admin,dc=example,dc=com" write
|
E: 27. by dn.base="cn=Admin,dc=example,dc=com" write
|
||||||
|
Loading…
Reference in New Issue
Block a user